> Hello,
>
> Does anybody has any experience with generating a certificate from a
> certificate request, by signing it with an nCipher HSM (the CA key being
> stored on the HSM), through the nCore API?
> I am specifically interested by the actual data stream that I need to
> provide to the HSM for it to sign.
> The mechanism that I intend to use for signing is SHA1 - RSA.
>
> Thank you in advance for your help!
>
> --
> Silviu Vlasceanu
>

I tried and failed with the API. I ended up using openssl, with the
following invocation..

/opt/nfast/bin/preload --preload-file=/opt/nfast/preload/preloadfile
--name-exact=rsa-<keyname> openssl ca -batch -cert <the signing cert.pem>
-engine chil -keyform engine -keyfile rsa-<keyname> -extensions <your
extensions name> -in <your cert request.pem> -out <your certfilename.pem>
-config ./sign.cnf

I don't think (but I may be wrong) that the nCipher HSM will turn your
cert request into a well formed cert. It will just sign the formed cert.
You still need openssl or something similar to parse the request and make
a cert.

If you find out how to sign directly through the API, I'd love to know.
There's a ~300ms setup/teardown cost using openssl to drive the HSM, since
it is essentially one cert per session. The API hypothetically lets you
operate much faster, but I could never get it work.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to